Generalised S - Box Nonlinearity NES / DOC / UIB / WP 5 / 020 / A Matthew

نویسنده

  • Matthew G. Parker
چکیده

In this paper the (effective) bias of certain generalised linear approximations to the S-box are considered. Whereas, in the literature, the cryptanalyst typically restricts this search to linear approximations over Z2, we here consider linear approximations over Z4 and, more generally still, consider approximations which are linear in the sense that they can be completely factorised into the tensor product of length-two vectors. Consequently, significantly higher biases can be found in comparison to Z2-linear approximations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Noekeon NES/DOC/UIB/WP3/009/1

In this note we analyse Noekeon, a 128-bit block cipher submitted to the NESSIE project. It is shown that for six of seven S-boxes which satisfy the design criteria of the Noekeon designers the resulting block ciphers are vulnerable to either a differential attack, a linear attack or both. One conclusion is that Noekeon is not designed according to the wide trail strategy. Also, it is shown tha...

متن کامل

Trawling Twofish (revisited) NES/DOC/UIB/WP3/004/a

Twofish is a 128-bit block cipher submitted as a candidate for the Advanced Encryption Standard (AES). It has a structure related to the Feistel structure and runs in 16 rounds. In this paper we consider mainly differentials of Twofish and show that there are differentials for Twofish for up to 16 rounds, predicting at least 32 bits of nontrivial information in every round. In addition, it hold...

متن کامل

A Differential Attack on Reduced-Round SC2000∗ NES/DOC/UIB/WP3/008/1

SC2000 is a 128-bit block cipher with key length of 128, 192 or 256 bits, developed by Fujitsu Laboratories LTD. For 128-bit keys, SC2000 consists of 6.5 rounds, and for 192and 256-bit keys it consists of 7.5 rounds. In this paper we demonstrate two different 3.5-round differential characteristics that hold with probabilities 2−106 and 2−107. These characteristics can be used to extract up to 3...

متن کامل

On convergence of homotopy analysis method to solve the Schrodinger equation with a power law nonlinearity

In this paper, the homotopy analysis method (HAM) is considered to obtain the solution of the Schrodinger equation with a power law nonlinearity. For this purpose, a theorem is proved to show the convergence of the series solution obtained from the proposed method. Also, an example is solved to illustrate the eciency of the mentioned algorithm and the h-curve is plotted to determine the region ...

متن کامل

NES / DOC / SAG / WP 3 / 019 / 2 y About the NESSIE Submission \ Using the general next bit predictor like an evaluation criteria " Markus Dichtl

The submitters discuss an approach to measure the unpredictability of a pseudo-randomly generated key stream. They propose to use machine learning techniques: frames of a xed length from the bit stream together with the bit immediately following the frame are used as learning data for a classi cation algorithm. The idea is to assign the frames to two classes, namely the frames which are followe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003